tag:blogger.com,1999:blog-595222474081220337.post7352987675788976876..comments2022-03-01T05:33:48.172-08:00Comments on The Hack Hut: Love Google Chrome? Hate Ads? So do I.Sum Deoshttp://www.blogger.com/profile/08276507582228063298noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-595222474081220337.post-5941755365838619022008-09-09T03:36:00.000-07:002008-09-09T03:36:00.000-07:00Well... perhaps you may be hacked. Lawl.Well... perhaps you may be hacked. Lawl.Wayfarerhttps://www.blogger.com/profile/01404157196407400788noreply@blogger.comtag:blogger.com,1999:blog-595222474081220337.post-89540792721152094592008-09-08T13:42:00.000-07:002008-09-08T13:42:00.000-07:00FYI any unencrypted data sent through a proxy can ...FYI any unencrypted data sent through a proxy can easily be mined the people running the proxy.<BR/><BR/>Symmetrical encryption schemes can be logged for decoding, asymmetrical may be MITM'd.Zaelorehttps://www.blogger.com/profile/16061375484139144345noreply@blogger.com